/openssl-master/crypto/rand/ |
A D | rand_pool.c | 66 size_t entropy) in ossl_rand_pool_attach() argument 86 pool->entropy = entropy; in ossl_rand_pool_attach() 128 return pool->entropy; in ossl_rand_pool_entropy() 149 pool->entropy = 0; in ossl_rand_pool_detach() 182 if (pool->entropy < pool->entropy_requested) in ossl_rand_pool_entropy_available() 188 return pool->entropy; in ossl_rand_pool_entropy_available() 198 if (pool->entropy < pool->entropy_requested) in ossl_rand_pool_entropy_needed() 199 return pool->entropy_requested - pool->entropy; in ossl_rand_pool_entropy_needed() 342 pool->entropy += entropy; in ossl_rand_pool_add() 399 int ossl_rand_pool_add_end(RAND_POOL *pool, size_t len, size_t entropy) in ossl_rand_pool_add_end() argument [all …]
|
A D | prov_seed.c | 16 unsigned char **pout, int entropy, in ossl_rand_get_entropy() argument 23 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); in ossl_rand_get_entropy()
|
/openssl-master/doc/man7/ |
A D | EVP_RAND.pod | 20 systems's entropy sources and providing access to deterministic random 49 You need to integrate a previously unsupported entropy source. 63 An EVP_RAND instance can be used as the entropy source of another 67 it does not make sense for the child to be an entropy source. 73 a live entropy source may ignore and not use its parent. 131 | os entropy sources | 159 its entropy source. The entropy source can be either a trusted operating 192 reseeding of the DRBG with fresh entropy by setting the 200 entropy from a live entropy source (section 5.5.2 of [NIST SP 800-90C]). 240 pulls the necessary entropy from its source automatically. [all …]
|
A D | EVP_RAND-TEST-RAND.pod | 54 Sets the bytes returned when the test generator is sent an entropy request. 78 unsigned char entropy[1000] = { ... }; 88 entropy, sizeof(entropy));
|
A D | provider-rand.pod | 44 int entropy, size_t min_len, size_t max_len, 112 from a live entropy source. Additional input I<addin> of length I<addin_len> 123 security level of I<entropy> bits and there will be between I<min_len> 125 true, the bytes will be produced from a live entropy source. Additional
|
/openssl-master/include/crypto/ |
A D | rand_pool.h | 81 size_t entropy; /* current entropy count in bits */ member 88 size_t entropy); 105 const unsigned char *buffer, size_t len, size_t entropy); 107 int ossl_rand_pool_add_end(RAND_POOL *pool, size_t len, size_t entropy);
|
A D | rand.h | 112 unsigned char **pout, int entropy,
|
/openssl-master/providers/implementations/rands/ |
A D | drbg.c | 145 int entropy, size_t min_len, in ossl_drbg_get_seed() argument 154 bytes_needed = entropy >= 0 ? (entropy + 7) / 8 : 0; in ossl_drbg_get_seed() 365 unsigned char *nonce = NULL, *entropy = NULL; in ossl_prov_drbg_instantiate() local 451 entropylen = get_entropy(drbg, &entropy, min_entropy, in ossl_prov_drbg_instantiate() 460 if (!drbg->instantiate(drbg, entropy, entropylen, nonce, noncelen, in ossl_prov_drbg_instantiate() 462 cleanup_entropy(drbg, entropy, entropylen); in ossl_prov_drbg_instantiate() 466 cleanup_entropy(drbg, entropy, entropylen); in ossl_prov_drbg_instantiate() 505 unsigned char *entropy = NULL; in ossl_prov_drbg_reseed() local 579 entropylen = get_entropy(drbg, &entropy, drbg->strength, in ossl_prov_drbg_reseed() 588 if (!drbg->reseed(drbg, entropy, entropylen, adin, adinlen)) in ossl_prov_drbg_reseed() [all …]
|
A D | test_rng.c | 45 unsigned char *entropy, *nonce; member 71 OPENSSL_free(t->entropy); in test_rng_free() 110 memcpy(out, t->entropy + t->entropy_pos, outlen); in test_rng_generate() 189 OPENSSL_free(t->entropy); in test_rng_set_ctx_params() 190 t->entropy = ptr; in test_rng_set_ctx_params() 231 int entropy, size_t min_len, size_t max_len, in test_rng_get_seed() argument 238 *pout = t->entropy; in test_rng_get_seed()
|
A D | drbg_local.h | 79 const unsigned char *entropy, size_t entropylen, 185 const unsigned char *entropy, size_t entropylen, 254 int entropy, size_t min_len, size_t max_len,
|
A D | seed_src.c | 178 int entropy, size_t min_len, size_t max_len, in seed_get_seed() argument 191 bytes_needed = entropy >= 0 ? (entropy + 7) / 8 : 0; in seed_get_seed()
|
A D | drbg_ctr.c | 307 const unsigned char *entropy, size_t entropylen, in drbg_ctr_instantiate() argument 313 if (entropy == NULL) in drbg_ctr_instantiate() 322 if (!ctr_update(drbg, entropy, entropylen, pers, perslen, nonce, noncelen)) in drbg_ctr_instantiate() 342 const unsigned char *entropy, size_t entropylen, in drbg_ctr_reseed() argument 347 if (entropy == NULL) in drbg_ctr_reseed() 351 if (!ctr_update(drbg, entropy, entropylen, adin, adinlen, NULL, 0)) in drbg_ctr_reseed()
|
A D | crngt.c | 104 int entropy, size_t min_len, size_t max_len, in ossl_crngt_get_entropy() argument 142 bytes_needed = (entropy + 7) / 8; in ossl_crngt_get_entropy()
|
/openssl-master/doc/man3/ |
A D | RAND_bytes.pod | 52 was able to seed itself from a trusted entropy source. 57 If the entropy source fails or is not available, the CSPRNG will enter an 62 On other platforms, there might not be a trusted entropy source available 63 or OpenSSL might have been explicitly configured to use different entropy sources. 64 If you are in doubt about the quality of the entropy source, don't hesitate to ask
|
A D | RAND_add.pod | 34 itself automatically using trusted system entropy sources. 42 random input obtained from polling various trusted entropy sources. 43 The default choice of the entropy source can be modified at build time, 59 be a trusted entropy source. It is mixed into the internal state of the RNG as
|
A D | EVP_RAND.pod | 117 system entropy sources. 132 If I<prediction_resistance> is specified, fresh entropy from a live source 142 If I<prediction_resistance> is specified, fresh entropy from a live source 145 EVP_RAND_reseed() reseeds the RAND with new entropy. 150 operating system. If I<prediction_resistance> is specified, fresh entropy
|
A D | OPENSSL_fork_prepare.pod | 28 the entropy pool used to generate random numbers (and therefore encryption
|
A D | RAND_egd.pod | 5 RAND_egd, RAND_egd_bytes, RAND_query_egd_bytes - query entropy gathering daemon
|
A D | RAND_set_rand_method.pod | 48 int (*add)(const void *buf, int num, double entropy);
|
/openssl-master/providers/common/ |
A D | provider_seeding.c | 48 int entropy, size_t min_len, size_t max_len) in ossl_prov_get_entropy() argument 53 pout, entropy, min_len, max_len); in ossl_prov_get_entropy()
|
/openssl-master/providers/implementations/include/prov/ |
A D | seeding.h | 34 int entropy, size_t min_len, size_t max_len);
|
/openssl-master/doc/internal/man3/ |
A D | ossl_rand_get_entropy.pod | 14 unsigned char **pout, int entropy, 27 The seeding material will have at least I<entropy> bytes of randomness and is
|
/openssl-master/doc/man1/ |
A D | openssl-rand.pod.in | 26 seed itself successfully from a trusted operating system entropy source.
|
/openssl-master/include/openssl/ |
A D | core_dispatch.h | 189 unsigned char **pout, int entropy, 500 int entropy, size_t min_len, size_t max_len,
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 967 PROV_R_ENTROPY_SOURCE_STRENGTH_TOO_WEAK:186:entropy source strength too weak 969 PROV_R_ERROR_RETRIEVING_ENTROPY:189:error retrieving entropy 1048 PROV_R_PARENT_CANNOT_SUPPLY_ENTROPY_SEED:187:parent cannot supply entropy seed 1090 RAND_R_ENTROPY_INPUT_TOO_LONG:106:entropy input too long 1091 RAND_R_ENTROPY_OUT_OF_RANGE:124:entropy out of range 1092 RAND_R_ERROR_ENTROPY_POOL_WAS_IGNORED:127:error entropy pool was ignored 1096 RAND_R_ERROR_RETRIEVING_ENTROPY:110:error retrieving entropy
|